Modeling Security Protocols in CSP
n B’s view (responder):
n Message 1  b getss from ‘a’:  a.na
n Message 2  b sends to j:  b.{a.na.nb}ServerKey(b)
n Message 4  b gets from ‘a’:  {a. kab}ServerKey(b) .{nb}kab
n In CSP this behavior can be modeled as follows:
Responder(b,nb ) =
    []  (receive.a.b.a.na g send.b.J.b .{a.na.nb}ServerKey(b)
  kab e Key          g receive.a.b.{a. kab}ServerKey(b) .{nb}kab
nb e Nonce  g Session(b,a,kab,na,nb) )
    m e T